Increasingly, a physical security director's role, the branch of computer security that is specifically related to the Internet, with issues involving fraud and the protection of transfer of data and a company's brand.
More than three-quarters of U.S. citizens are concerned about the privacy and security of their personal digital data, and almost two-thirds say they would feel more confident if government agencies with which they interact had stronger data-privacy and security policies.
It might be a more exciting story to claim a nation-state pilfered your data, but the more likely scenario is that your enterprise failed at some of the most basic tenets of cybersecurity hygiene, leaving the door open to script kiddies and opportunitistic hackers to run rampant in your system. Join us as we debunk 5 major data breach myths.
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!